C:\uqef\Kudy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
39ae3a48c6cddbc9b20e9b97ec60cf9b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39ae3a48c6cddbc9b20e9b97ec60cf9b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39ae3a48c6cddbc9b20e9b97ec60cf9b_JaffaCakes118
-
Size
172KB
-
MD5
39ae3a48c6cddbc9b20e9b97ec60cf9b
-
SHA1
689c56bc32d5a20b213582ee4d5e76c13a930b69
-
SHA256
fac321a2e446a88f55f95ec2c581e4d87b16c82c5b7f74b11c201f7140772be0
-
SHA512
2d4652302131894b0f1adf67bcf451532da2f932cc1696f036fc9536b774632fa8431889b9659e8675ef0db817c06dd165e4df629b845f6a53bd845e3f21d45f
-
SSDEEP
3072:rDtyjh2SnS8UyiyJrRTCIMns1SldAzhnSlTaWdxneXDkVr7hHaA:PtyFw8eyvTCu1S0hne5DeXDWrdJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39ae3a48c6cddbc9b20e9b97ec60cf9b_JaffaCakes118
Files
-
39ae3a48c6cddbc9b20e9b97ec60cf9b_JaffaCakes118.exe windows:4 windows x86 arch:x86
3d9b30aa70a2ade15ddc13019aae58e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
TranslateMessage
GetPropW
UnregisterHotKey
CreateMenu
DeferWindowPos
BeginDeferWindowPos
ValidateRect
PostMessageW
InvalidateRect
EmptyClipboard
BeginPaint
DestroyMenu
GetSystemMetrics
MapWindowPoints
GetIconInfo
SetWindowTextW
SendMessageW
CheckDlgButton
LoadBitmapW
IsDialogMessageW
CreateWindowExW
GetSysColor
MessageBoxW
DialogBoxIndirectParamW
SetScrollInfo
IsWindow
CallWindowProcW
RegisterWindowMessageW
SetMenuItemInfoW
LoadIconW
ws2_32
getservbyname
htons
recv
send
recvfrom
getsockopt
ioctlsocket
ntohl
inet_addr
socket
inet_ntoa
listen
wininet
InternetCloseHandle
HttpSendRequestExW
InternetAttemptConnect
HttpEndRequestW
InternetWriteFile
InternetSetOptionW
InternetReadFile
InternetQueryOptionW
InternetQueryDataAvailable
InternetOpenW
InternetGetCookieW
InternetErrorDlg
HttpAddRequestHeadersW
HttpOpenRequestW
HttpQueryInfoW
HttpSendRequestW
InternetCrackUrlW
InternetConnectW
rpcrt4
UuidFromStringW
RpcImpersonateClient
RpcRevertToSelf
NdrServerCall2
I_RpcBindingIsClientLocal
RpcMgmtSetServerStackSize
RpcServerListen
kernel32
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
LCMapStringW
WideCharToMultiByte
LCMapStringA
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapSize
SetEndOfFile
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
InitializeCriticalSection
CreateFileA
VirtualQuery
InterlockedExchange
RtlUnwind
FlushFileBuffers
SetStdHandle
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
GetCurrentThreadId
SetLastError
TlsAlloc
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
GetModuleFileNameW
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
GetCurrentProcess
TerminateProcess
GetProcAddress
ExitProcess
IsBadWritePtr
HeapReAlloc
VirtualAlloc
FatalAppExitA
VirtualFree
HeapCreate
HeapDestroy
LeaveCriticalSection
CloseHandle
ReadFile
GetFileSize
SetFilePointer
CreateFileW
DeleteCriticalSection
WriteConsoleW
HeapFree
HeapAlloc
GetModuleHandleA
GetVersionExA
GetLastError
EnterCriticalSection
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE